Huge vulnerability disclosed this week for Android devices performing a remote code execution over MMS. Fortunately, there are some things you can do to increase the level of security on your smartphone.

We rely on smart security devices to protect our homes: alarms, smoke detectors, video surveillance and such. But what if…

When you have to work with thousands of files per day, it is generally a good idea to generate a hash of a file that would identify it on a unique way. A hash function is any function that can be used to map digital data of arbitrary size to digital data of fixed size.

There are many hashing algorithms to choose from. Here are the main factors to take into consideration when deciding which one…

You’ve heard it a thousand times: A car can be hacked. But of course you don’t take this warning seriously. Why should you, right? I know for sure that I don’t, most of the time. Especially since my car is kind of old. The most recent news gave me pause though – and might make yourself more security aware as well when it comes to your car.

Why? Because cars are now definitely hackable. It has been proven. By driving a Chrysler Jeep Cherokee in a ditch.…